Sciweavers

6199 search results - page 1224 / 1240
» Monitoring the
Sort
View
BMCBI
2011
13 years 2 months ago
Detection of viral sequence fragments of HIV-1 subfamilies yet unknown
Background: Methods of determining whether or not any particular HIV-1 sequence stems - completely or in part - from some unknown HIV-1 subtype are important for the design of vac...
Thomas Unterthiner, Anne-Kathrin Schultz, Jan Bull...
CGA
2011
13 years 2 months ago
Visualization at Supercomputing Centers: The Tale of Little Big Iron and the Three Skinny Guys
Supercomputing Centers (SC’s) are unique resources that aim to enable scientific knowledge discovery through the use of large computational resources, the Big Iron. Design, acq...
E. Wes Bethel, John Van Rosendale, Dale Southard, ...
CN
2011
116views more  CN 2011»
13 years 2 months ago
WDA: A Web farm Distributed Denial Of Service attack attenuator
Distributed Denial Of Service (DDoS) attacks are familiar threats to Internet users for more than ten years. Such attacks are carried out by a “Bot net”, an army of zombie hos...
Ehud Doron, Avishai Wool
COMCOM
2011
13 years 2 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 2 months ago
Kron Reduction of Graphs with Applications to Electrical Networks
Abstract. Consider a weighted and undirected graph, possibly with self-loops, and its corresponding Laplacian matrix, possibly augmented with additional diagonal elements correspon...
Florian Dörfler, Francesco Bullo
« Prev « First page 1224 / 1240 Last » Next »